Authentication

This help contains the following topics:

Introduction

ISP domains

AAA manages users based on the users' ISP domains. Each ISP domain maintains a set of authentication, authorization, and accounting methods to control the AAA behaviors of users in the ISP domain. The administrator can configure authentication, authorization, and accounting methods of an ISP domain based on the user access types and security requirements in the domain.

The device supports the following authentication methods:

The device supports the following authorization methods:

The device supports the following accounting methods:

On a NAS, each user belongs to one ISP domain. The NAS determines the ISP domain to which a user belongs based on the username entered by the user at login. AAA manages users in the same ISP domain based on the users' access types. The device supports the following user access types:

In a networking scenario with multiple ISPs, the device can connect to users of different ISPs. The device supports multiple ISP domains, including the system-defined ISP domain system. On the device, each user belongs to an ISP domain. If a user does not provide an ISP domain name at login, the device considers the user belongs to the default ISP domain. You can specify an ISP domain as the default domain.

The device chooses an authentication domain for each user in the following order:

  1. The authentication domain specified for the access module.

  2. The ISP domain in the username.

  3. The default ISP domain of the device.

RADIUS

Overview

Remote Authentication Dial-In User Service (RADIUS) is a distributed information interaction protocol that uses a client/server model. The protocol can protect networks against unauthorized access and is often used in network environments that require both high security and remote user access.

RADIUS uses UDP to transmit packets. The RADIUS client and server exchange information between them with the help of shared keys, which are preconfigured on the client and server.

To provide AAA services to users, you need to configure the RADIUS server parameters on the access device.

Enhanced RADIUS features

LDAP

Overview

The Lightweight Directory Access Protocol (LDAP) provides standard multiplatform directory service. LDAP uses a client/server model, and all directory information is stored in the LDAP server.

LDAP is suitable for storing data that does not often change. The protocol is used to store user information. For example, LDAP server software Active Directory Server is used in Microsoft Windows operating systems. The software stores the user information and user group information for user login authentication and authorization.

LDAP uses directories to maintain the organization information, personnel information, and resource information. The directories are organized in a tree structure and include entries. An entry is a set of attributes with distinguished names (DNs). The attributes are used to store information such as usernames, passwords, emails, computer names, and phone numbers.

LDAP attribute map

The LDAP attribute map feature enables the device to convert LDAP attributes obtained from an LDAP authorization server to device-recognizable AAA attributes based on the mapping entries. Because the device ignores unrecognized LDAP attributes, configure the mapping entries to include important LDAP attributes that should not be ignored.

An LDAP attribute can be mapped only to one AAA attribute. Different LDAP attributes can be mapped to the same AAA attribute. The LDAP attribute map defines a list of LDAP-AAA attribute mapping entries. To apply the LDAP attribute map, specify the name of the LDAP attribute map in the LDAP scheme used for authorization.

RESTful server

The RESTful server configuration defines the related parameter settings for the device to communicate with the RESTful server. The parameters include the login account and the URIs of the RESTful server. After establishing a connection with the RESTful server, the device can import identity users and online users from the server.

Security management server set

The security management server set configuration defines the related parameters of the device to communicate with third-party servers, including the server IP address, server port, and service port number. After establishing connections with the servers, the device can receive the user login and logout information from the servers to update online users.

vSystem support information

Support of non-default vSystems for this feature depends on the device model. This feature is available on the Web interface only if it is supported.

Restrictions and guidelines

Restrictions and guidelines: ISP domains

Restrictions and guidelines: RADIUS configuration

Restrictions and guidelines: LDAP configuration

When the device needs to cooperate with an LDAP authorization server, you must configure related LDAP settings on the device at the CLI.

Configure authentication

To manage users of different ISPs, specify authentication, authorization, and accounting methods of different access types for each ISP domain and configure the domain attributes as needed. Domain attributes include the status of an ISP domain and authorization attributes for users in the ISP domain.

Configure an ISP domain

  1. Click the Objects tab.

  2. In the navigation pane, select User > Authentication > ISP Domains.

  3. Click Create.

    Figure-1 ISP domain

  4. Create an ISP domain.

    Figure-2 Adding an ISP domain

    Figure-3 AAA methods for login users

    Figure-4 AAA methods for LAN users

    Figure-5 AAA methods for portal users

    Figure-6 AAA methods for ADVPN users

    Figure-7 AAA methods for SSL VPN users

    Figure-8 AAA methods for PPP users

    Table-1 ISP domain configuration items

    Item

    Description

    Domain name

    Enter a name for the ISP domain.

    The ISP domain name is a case-insensitive string of 1 to 255 characters that uniquely identifies an ISP domain. The name must meet the following requirements:

    • It cannot contain any of the following characters: forward slash (/), backslash (\), vertical bar (|), quotation marks ("), colon (:), asterisk (*), question mark (?), left angle bracket (<), right angle bracket (>), or at sign (@).

    • It cannot be d, de, def, defa, defau, default, default, i, if, if-, if-u, if-un, if-unk, if-unkn, if-unkno, if-unknow, or if-unknown.

    Status

    Select a state for the ISP domain.

    • Active—Places the ISP domain in active state to allow the users in the ISP domain to request network services.

    • Blocked—Places the ISP domain in blocked state to prevent users in the ISP domain from requesting network services.

    Access types

    Select access types for the users in the ISP domain.

    Select the access type for a user based on the access authentication requirements of the user. For example, select Login for administrators.

  5. (Optional.) Configure advanced settings.

    Figure-9 Advanced settings

    Table-2 Advanced setting configuration items

    Item

    Description

    Idle timeout

    Set the idle timeout period.

    The device logs out a user if the user's total traffic in the idle timeout period is less than the specified minimum traffic.

    Min traffic in an idle timeout

    Set the minimum traffic that must be generated in the idle timeout period.

    IP address pool

    Enter the name of an IP address pool.

    The device assigns an IP address in the IP address pool to each authenticated PPP or portal user.

  6. Click Apply. The new ISP domain is displayed in the ISP Domains page.

Configure RADIUS

  1. Click the Objects tab.

  2. In the navigation pane, select User > Authentication > RADIUS.

    Figure-10 RADIUS page

  3. Click Create.

  4. Create a RADIUS scheme.

    Figure-11 Creating a RADIUS scheme

    Table-3 RADIUS scheme configuration items

    Item

    Description

    Scheme name

    Specify the name that uniquely identifies the RADIUS scheme.

    Authentication servers

    Create, edit, or delete authentication servers.

    The configuration items include the IP address, port number, and shared key.

    Accounting servers

    Create, edit, or delete accounting servers.

    The configuration items include the IP address, port number, and shared key.

    Global shared key for authentication/accounting

    Specify the global shared key.

    The global shared key is used only when no key is specified for the authentication server or accounting server.

  5. Configure advanced settings.

    Figure-12 Advanced settings

    Table-4 RADIUS advanced configuration items

    Item

    Description

    Source IPv4 address for outgoing RADIUS packets

    Source IPv4 address used by the device to send RADIUS packets.

    Source IPv6 address for outgoing RADIUS packets

    Source IPv6 address used by the device to send RADIUS packets.

    Server response timeout

    If a period of time has passed after a RADIUS request packet is sent out and the device has not received a response from the RADIUS server, it is necessary to retransmit the RADIUS request packet to ensure that users obtain RADIUS services as much as possible. This period is known as the RADIUS server response timeout.

    Max RADIUS packet transmission attempts

    Maximum number of times a device can retransmit a RADIUS request packet to the RADIUS server.

    Server quiet timer

    Time it takes for the server to return to active status. Set this time reasonably.

    Real-time accounting timer

    The smaller the interval for real-time accounting, the higher the accuracy of accounting, and correspondingly, higher performance requirements are placed on the device and RADIUS server.

    Max real-time accounting attempts

    If the RADIUS server fails to respond to the device's real-time accounting requests more times than the specified maximum, the user's connection will be terminated.

    Format of usernames sent to servers

    Access users are typically named in the format of userid@isp-name, with the part after @ being the ISP domain name. The device can use this domain name to determine which ISP domain the user belongs to. If RADIUS servers cannot accept usernames with an ISP domain name, the domain name needs to be removed from the username.

    Data flow measurement unit

    Unit of the data stream sent to the RADIUS server.

    Packet measurement unit

    Unit of the data packets sent to the RADIUS server.

    Online user password change

    After a user is successfully authenticated, if the server sends an Access-Challenge packet with a Reply-Message attribute to the device, the device will prompt the user to change the password.

    Accounting-on

    The accounting-on feature ensures that, after the device restarts, it notifies the RADIUS accounting server used by this solution by sending an accounting-on packet, requesting the RADIUS server to stop accounting and forcibly log off the users of that device.

    Accounting-on packet retransmission interval

    Interval for resending the packet if no response is received from the RADIUS server after the device sends an accounting-on packet.

    Max accounting-on packet transmission attempts

    Maximum number of times the packet is sent if no response is received from the RADIUS server after the device sends an accounting-on packet.

    Reply message property resolution rule

    Configuration of RADIUS attribute parsing rule:

    • Request new password: Users are required to enter a new password.

    • Request new token: When a two-factor authentication mechanism is used, users need to submit the next factor of identity verification for secondary authentication.

  6. Click Apply.

Configure LDAP

To configure an LDAP scheme:

  1. Click the Objects tab.

  2. In the navigation pane, select User > Authentication > LDAP > LDAP Schemes.

  3. Click Create.

    Figure-13 LDAP scheme page

  4. Create an LDAP scheme.

    Figure-14 Creating an LDAP scheme

    Table-5 LDAP scheme configuration items

    Item

    Description

    Name

    Enter a name for the LDAP scheme.

    The scheme name uniquely identifies an LDAP scheme.

    LDAP attribute map

    Select an LDAP attribute map for LDAP authorization.

    The device converts LDAP attributes obtained from the LDAP authorization server to device-recognizable AAA attributes.

    Authentication server

    Enter a name for the LDAP authentication server.

    You can configure parameters for the LDAP authentication server to ensure that the device and server can establish connections.

    Authorization server

    Enter a name for the LDAP authorization server.

    You can configure parameters for the LDAP authorization server to ensure that the device and server can establish connections.

    Ignore the SearchResRef field

    By enabling this feature, the device will ignore the SearchResultReference field carried in the LDAP query results and save the currently queried user data to prevent the overall query failure caused by the following two situations:

    • An abnormal deployment of the LDAP server leads to the LDAP server responding to query requests with the SearchResultReference field, and the device fails to complete the domain name resolution for all URLs in the SearchResultReference field in time.

    • The LDAP server does not support anonymous queries, and the anonymous query requests initiated by the device are rejected by the server.

  5. Click Apply. The new LDAP scheme is displayed in the LDAP Schemes page.

To configure an LDAP server:

  1. Click the Objects tab.

  2. In the navigation pane, select User > Authentication > LDAP > LDAP Server.

  3. Click Create.

    Figure-15 LDAP server page

  4. Create an LDAP server.

    Figure-16 Creating an LDAP server

    Table-6 LDAP server configuration items

    Item

    Description

    Name

    Enter a name for the LDAP server.

    The server name uniquely identifies an LDAP server.

    VRF

    Select the VPN instance to which the LDAP server belongs.

    Do not configure this item if the LDAP server belongs to the public network.

    IP address type

    Select an IP address type for the LDAP server.

    Options are IPv4 and IPv6.

    Server IP address

    Enter the IP address of the LDAP server.

    Port

    Enter the service port number of the LDAP server.

    The default port number is 389. After you specify an SSL client policy, the default port number changes to 636.

    SSL client policy

    Specify an SSL client policy, which is used to encrypt the traffic between the SSL client and the LDAP server.

    Source address type

    Select a source address type for LDAP packets sent to the LDAP server.

    Options are source IP address and source interface.

    Source IPv4 address

    Specify an IPv4 address as the source IP address for LDAP packets sent to the LDAP server.

    Source IPv6 address

    Specify an IPv6 address as the source IP address for LDAP packets sent to the LDAP server.

    Source interface

    Select an interface to provide source IP address for LDAP packets sent to the LDAP server.

    This parameter is available only if the source address type is source interface.

    Administrator DN

    Enter the administrator DN.

    The administrator DN on the device must be the same as the administrator DN configured on the LDAP server.

    Administrator password

    Enter the administrator password.

    LDAP version

    Select an LDAP version.

    Options are LDAPv2 and LDAPv3.

    The LDAP version used by the device must be consistent with the version used by the LDAP server.

    Server timeout period

    Set the LDAP server timeout period.

    If the device sends a bind or search request to the LDAP server without receiving the server's response within the server timeout period, the authentication or authorization request times out.

    User group filter

    Enter a user group filter.

    When the device requests to import user group information from the LDAP server, the LDAP server sends only user groups that match the user group filter to the device.

    Coded Format

    Configure the character encoding format used by the LDAP server.

    Base DN for user search

    Enter the base DN for user search.

    If the LDAP server contains many directory levels, a user DN search starting from the root directory can take a long time. To improve efficiency, you can change the start point by specifying the search base DN.

    User search scope

    Select a user search scope.

    • All-level—The user search goes through all subdirectories of the base DN.

    • Single-level—The user search goes through only the next lower level of subdirectories under the base DN.

    Username attribute

    Enter the value of the username attribute. The default value is cn.

    Username format

    Select a format for usernames to be sent to the LDAP server.

    • With-domain—Includes the ISP domain name in the usernames sent to the LDAP server.

    • Without-domain—Excludes the ISP domain name from the usernames sent to the LDAP server.

    User object class

    Enter a user object class for user search.

  5. Click Apply. The new LDAP server is displayed in the LDAP Servers page.

To configure an LDAP attribute map:

  1. On the LDAP Attribute Map page, click Create.

    Figure-17 LDAP Attribute Map page

    Figure-18 Creating an LDAP attribute map

  2. On the Create LDAP Attribute Map page, enter a map name, and click Create in the Mapping entries area. On the page that opens, configure the following settings:

    Figure-19 Creating an LDAP attribute

    Table-7 LDAP attribute map configuration items

    Item

    Description

    LDAP attribute

    Name of the LDAP attribute to be mapped.

    Prefix

    Prefix within the LDAP attribute string (for example, cn=).

    Delimier

    Delimiter within the LDAP attribute string (for example, a comma). If this parameter is not specified, it means the mapped LDAP attribute string is a whole and does not require a delimiter.

    AAA attribute

    AAA attribute to be mapped, which includes types such as Mobile number, User group, and User Profile.

  3. Click Apply.

Configure a RESTful server

  1. Click the Objects tab.

  2. In the navigation pane, select User > Authentication > RESTful Server.

  3. Click Create.

    Figure-20 RESTful server page

  4. Create a RESTful server.

    Figure-21 Creating a RESTful server

    Table-8 RESTful server configuration items

    Item

    Description

    Name

    Enter a name for the RESTful server.

    The name uniquely identifies a RESTful server.

    Username

    Enter the username for logging in to the RESTful server.

    Password

    Enter the password for logging into the RESTful server.

    Get-user-account URI

    Enter the URI used to request user account information from the RESTful server.

    Get-online-user URI

    Enter the URI used to request online user information from the RESTful server.

    Get-user-group URI

    Enter the URI used to request user group information from the RESTful server.

    Put-online-user URI

    Enter the URI used to upload online user information to the RESTful server.

    If the device adds an identity user that is not imported from the RESTful server, the device uploads the online user information to the RESTful server.

    Put-offline-user URI

    Enter the URI used to upload offline user information to the RESTful server.

    If the device deletes an identity user that is not imported from the RESTful server, the device uploads the offline user information to the RESTful server.

    VRF

    Select the VRF to which the RESTful server belongs.

    Do not configure this item if the RESTful server belongs to the public network.

    Enable server detection

    Select this item to enable RESTful server reachability detection.

    When this feature is enabled, the device detects the reachability of the RESTful server.

    Detection interval

    Specify the interval at which the device detects the RESTful server reachability.

    Max probes per detection

    Specify the maximum number of RESTful server detection attempts allowed.

  5. Click Apply. The new RESTful server is displayed in the RESTful Server page.

Configure a security management server set

  1. Click the Objects tab.

  2. In the navigation pane, select User > Authentication > Sec Mgt Server Set.

  3. Click Create.

    Figure-22 Security management server page

  4. Create a security management server set.

    Figure-23 Creating a security management server set

    Table-9 Security management server set configuration items

    Item

    Description

    Name

    Enter a name for the security management server set.

    The name uniquely identifies a security management server set.

    Server addresses

    Enter the IP addresses of the TSM servers.

    Listening port

    Enter the port for listening to packets from the TSM servers.

    Encryption algorithm

    Select an encryption algorithm to decrypt packets from the TSM servers.

    Shared key

    Enter the shared key to decrypt packets from the TSM servers.

  5. Click Apply. The newly created security management server set is displayed on the Security Management Server Set page.